Over the past few weeks we have been following a bad actor as they attack and takes control of a WordPress website we manage. In the process, we have seen them riddle the site with backdoors to ensure they are able to retain control and perform some rudimentary SPAM injections pointing to 17 domains with over 17,000 entries. This article […]
Category: Educational Guide
Open-Source CMS’ and Software Bill of Material (SBOM)
Software Bill of Materials (SBOM) have grown in popularity in the past year as a means to help curve the impact software vulnerabilities in open-source technologies have been having on organizations. The concept itself is not new, its foundation are found in other industries; most notably traditional supply chain management. The biggest difference being its […]
Active Exploits against CVE-2021-41773 (Apache Web Server Exploit)
The NOC platform offers its customers a global CDN / WAF. This technology runs on an anycast network that has points of presence around the world. This network design allows us to give our customers exceptional performance, but also gives us the ability to glean insights about what is happening on the web. Today we […]
Recovering a Business From a Cyber Attack
Over the past decade we have helped countless organizations respond to security incidents around the world. There is a common theme each time, with exception to large enterprises with an established security team, most small businesses have no idea where to start. The following article will help expand on some of the lessons we’ve learned […]
Arbitrary File Vulnerabilities And Why They Matter to Your Website
Our last article explored trends we were seeing against WordPress and something became very evident – Arbitrary File Vulnerabilities ranked #1 for vulnerabilities being scanned for. Although the scope of our tests were limited, it does a lot to help better defenders better understand the tactics, techniques and procedures (TTP) being employed by bad actors. Why Arbitrary […]
Steps To Recovering Servers Post-Hack
After a hack, should an organization restore its servers from a new OS or from the backup? This is the question that we were posed with during a recent incident response case. The organization had been given two very different opinions, and wanted to know what we would do. The recommendations they had received came […]